While the market for security applications that monitor\n and filter enterprise content is relatively new and\n small\u2014around $60 million in 2006\u2014Gartner says it is\n growing. Here\u2019s a sampling of some infosecurity products\n CIOs are using today.\n\n iPrism\n St. Bernard Software claims iPrism blocks IM and peer-to-peer\n traffic and blocks employees from visiting URLs that are\n phishing sites, contain threats to PCs or aren\u2019t\n prohibited by enterprise usage policies.\n\n Metron\n eTelemetry says Metron tracks bandwidth usage, surfing and\n chatting. Its Locate product passively maps people to the IT\n infrastructure. Together, eTelemetry claims its\n \u201cpeople-to-IP\u201d matching technology provides\n visibility into how each employee is using the\n infrastructure.\n\n Securify\n Securify claims its appliance passively captures and analyzes\n traffic into and out of critical data centers and across\n corporate boundaries such as extranets. Securify says its\n \u201cmonitors\u201d track all transactions to users to\n provide a view of \u201cwho\u201d is accessing\n \u201cwhat\u201d applications and \u201cwhere\u201d in the\n network.\n\n 7\n Vontu claims that 7 is the first integrated, enterprise-class\n data loss prevention product that identifies \u201cdata at\n rest, data in motion and data at the\n endpoint\u201d\u2014meaning on servers, databases and PCs;\n e-mail, IM and Web; and removable media such as USBs, CDs and\n iPods.\n\n Vericept\n Vericept says its Risk Management platform gives enterprises\n visibility into all insider risk whether inadvertent or\n malicious. These include unauthorized access of confidential\n customer information; document leaks; unencrypted transmission\n of cardholder information; the posting of financial reports and\n source code; damaging blogs by insiders; intellectual property\n theft; and network and e-mail control.